Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

CIS Benchmarks

Review the CIS Benchmarks™ that have been adopted by Armor

Image RemovedInfrastructure

Virtual Machines
Create, configure and maintain your instance. Learn how to review the Virtual Machines screen, export usage data, or install the Anywhere Agent for your specific operating system.

Image RemovedSecurity

DASHBOARDS

Use the security dashboards to review and troubleshoot data for your instance.

ARMOR SERVICES

Incidents
Review critical support tickets, known as Security Incidents.

Log Management
Learn how to view your log statuses, search for collected logs, and obtain log relay.

Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.

IP Threat Lookup
Research the reputation of specific IP addresses, or create a rule to allow or block an IP address.

Malware Protection
Learn how to view malware events, and how malware data affects the security status of your instance.

File Integrity Monitoring (FIM)
Learn how FIM data affects the security status of your instance.

Intrusion Detection
View data from the host-based intrusion detection system (HIDS).

Vulnerability Scanning
View a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.

DASHBOARDS

Use the security dashboards to review and troubleshoot data for your instance.

Image AddedSecurity


Image AddedInfrastructure

Virtual Machines
Create, configure and maintain your instance. Learn how to review the Virtual Machines screen, export usage data, or install the Anywhere Agent for your specific operating system.

CIS Benchmarks

Review the CIS Benchmarks™ that have been adopted by Armor